This year, the Linux kernel turns 31 years old(!), and a lot has changed since its inception in the early 90’s. Linux these days is ubiquitous, being the backbone of the Cloud, many IOT devices, and of course, a large part of the hybrid server estate and with great power, comes the great responsibility to ensure the most security without slowing operators down.
Attackers crave elevated access and enforcing least privilege is a foundational security control to prevent privileged attackers from gaining foothold across any point of entry. CyberArk extends an additional layer of security to enforce least privilege and centralize privilege escalation management in Linux environments with the recent release of Endpoint Privilege Manager (EPM) for Linux.
In this webinar, hear from Brandon Traffanstedt, Sr. Director, Field Technology Office, CyberArk and Cameron Skidmore, Global Partner Solutions Architect, Red Hat as they showcase how:
-CyberArk and Red Hat have partnered together to level up security across enterprise IT environments
-Common security controls can be applied to Linux systems consistently
-CyberArk EPM for Linux extends centralized least privilege to Red Hat Enterprise Linux (RHEL)
-EPM for Linux maximizes risk reduction benefits with minimal resources, allowing organizations to securely scale RHEL deployments to the Cloud and Edge
-See demonstrations in action: certificate signing just-in-time, centralized SUDOers management, and our favorite, mitigation of malicious behavior like elevated shell escapes
Recommended for You

CyberArk Chief Strategy Officer Clarence Hinton explores trends, market dynamics and other issues shaping the 2025 identity security landscape.

Learn how unified PAM + IGA simplifies access reviews, cuts audit fatigue, and boosts security with Zero Standing Privileges.

Discover AI's risks and rewards in this CyberArk Labs webinar with real attacks, insights and tips for IT security leaders.

Secrets sprawl is growing fast. Join CyberArk experts to explore a practical, unified approach to securing secrets across modern cloud-native environments.

IGA experts discuss the evolving security perimeter amid growing applications, remote access, users, and permissions in today’s enterprise environments.

This presentation discusses Segregation of Duties risks, real-world failures like the Société Générale scandal, and showcases Zilla’s identity security platform.

Zilla’s talk explores the hidden risks of service accounts, offering guidance on managing and securing these often-overlooked non-human identities.

Zilla's tech talk presents AI-driven identity governance automation to streamline access reviews, provisioning, and identity operations.

Zilla and Guide Point leaders discuss key challenges and strategies for achieving effective identity management in modern cloud environments.

90% of identity leaders struggle with roles—this webinar explores an AI-driven, automated approach to delivering job-appropriate access at scale.

Zilla leaders and experts share 2025 IGA best practices and insights from a recent market research survey of identity leaders.

Discover how identity security can play a pivotal role in achieving and maintaining compliance on endpoints.

The advantages of an identity security platform & how to maximize risk reduction by managing and securing identities with appropriate privilege controls.

Learn 5 proven strategies to boost adoption of your WPM tool and build secure, low-friction password habits across your workforce.

MFA isn’t enough. Learn how attackers bypass it—and how to secure access beyond the login with Identity Security

Machine identity sprawl is rising. Hear expert insights from ESG and CISO tips to improve visibility, control, and security.

CyberArk experts uncover Scattered Spider’s latest identity attacks and review how to detect threats and defend against privilege abuse.

The CA/Browser Forum has approved sweeping changes to the TLS certificate lifecycle, reducing the maximum validity for public certificates to just 47 days, down from today’s 398.

Phishing and compromised credentials remain the leading causes of security breaches. Traditional passwords are not only vulnerable.

This guide explains what certificate lifecycle management (CLM) is and why it should be central to your machine identity security strategy.